I've been dealing with IP blocklists using two other methods before email even reaches SA: - In postfix my smtpd_recipient_restrictions includes "reject_rbl_client zen.spamhaus.org, reject_rhsbl_reverse_client dbl.spamhaus.org, reject_rhsbl_helo dbl.spamhaus.org, reject_rhsbl_sender dbl.spamhaus.org" and I'm guessing potentially others could be added. - IP/CIDR lists like the one you mention, but also lists like Stop Forum Spam (https://www.stopforumspam.com/) I cron fetch then add to an ipset with a DROP (which is quite similar to what others are suggesting).
I find that those are quite suitable.

Bert

On 10/11/2022 18:05, Grant Taylor via users wrote:
On 11/10/22 9:54 AM, Joey J wrote:
Hello All,

Hi,

I'm trying to see if there is a way to incorporate network ranges into SA to essentially flag messages.

N.B. at least one of the lists below is individual IPs and not networks / ranges of IPs.  --  I'm not sure how to square that peg with your wants / needs.

I know I can use iptables and reject it before getting to SA, but in some cases we would have legit email get flagged within these bigger blocks.

I would suggest investigating the other offerings from each vendor.  I suspect there is a good chance that many, if not all, of them offer a DNS based query method.

See Riccardo's comment about Spamhaus / Spamteq.

I'm trying to incorporate:
feeds.dshield.org/block.txt
spamhaus.org/drop/drop.lasso
ciarmy.com/list/ci-badguys.txt
openbl.org/lists/base.txt
Short of that, it wouldn't be hard to turn them into a locally hosted BL and then configure SpamAssassin to query it.




Reply via email to